Attack Vulnerability of Complex Networks. Holme, P., Kim, B. J., Yoon, C. N., & Han, S. K. 65(5):056109.
Attack Vulnerability of Complex Networks [link]Paper  doi  abstract   bibtex   
We study the response of complex networks subject to attacks on vertices and edges. Several existing complex network models as well as real-world networks of scientific collaborations and Internet traffic are numerically investigated, and the network performance is quantitatively measured by the average inverse geodesic length and the size of the largest connected subgraph. For each case of attacks on vertices and edges, four different attacking strategies are used: removals by the descending order of the degree and the betweenness centrality, calculated for either the initial network or the current network during the removal procedure. It is found that the removals by the recalculated degrees and betweenness centralities are often more harmful than the attack strategies based on the initial network, suggesting that the network structure changes as important vertices or edges are removed. Furthermore, the correlation between the betweenness centrality and the degree in complex networks is studied.
@article{holmeAttackVulnerabilityComplex2002,
  title = {Attack Vulnerability of Complex Networks},
  volume = {65},
  url = {https://link.aps.org/doi/10.1103/PhysRevE.65.056109},
  doi = {10.1103/PhysRevE.65.056109},
  abstract = {We study the response of complex networks subject to attacks on vertices and edges. Several existing complex network models as well as real-world networks of scientific collaborations and Internet traffic are numerically investigated, and the network performance is quantitatively measured by the average inverse geodesic length and the size of the largest connected subgraph. For each case of attacks on vertices and edges, four different attacking strategies are used: removals by the descending order of the degree and the betweenness centrality, calculated for either the initial network or the current network during the removal procedure. It is found that the removals by the recalculated degrees and betweenness centralities are often more harmful than the attack strategies based on the initial network, suggesting that the network structure changes as important vertices or edges are removed. Furthermore, the correlation between the betweenness centrality and the degree in complex networks is studied.},
  number = {5},
  journaltitle = {Physical Review E},
  shortjournal = {Phys. Rev. E},
  urldate = {2018-09-09},
  date = {2002-05-07},
  pages = {056109},
  author = {Holme, Petter and Kim, Beom Jun and Yoon, Chang No and Han, Seung Kee},
  file = {/home/dimitri/Nextcloud/Zotero/storage/PW8XHWT3/PhysRevE.65.html}
}
Downloads: 0